spam

Five Popular Spam Scams

Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone ...
rootkit

What is a Rootkit?

Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The ter...
Kapersky_Mac

Protecting Your Mac From Malware

Due to a lack of malicious activity targeting Mac OS X it has been considered a relatively safe operating system for some time now. But times change, and that complacency can no l...
cyberwar

Make Love Not Cyberwar

Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into saying they support cyberwar; but they ha...
FB_poll_malware

The Importance of Destroying Malware

No one likes malware. In fact, pretty much everyone hates it. But it’s not the worst problem facing the world right now either. The problems in the online world pale in comparison...
google chrome

Browser Security: Google Chrome

The first thing you want to be aware of when discussing security features on Google’s Chrome browser is that many of the best options aren’t built into the browser, but rather are...
android-malware

Android Under Attack

The good old days, when the owners of mobile phones and smartphones had little to fear from malicious programs and could keep all their personal info in their devices’ memory, are...